Sciweavers

5273 search results - page 166 / 1055
» Secured Web Access
Sort
View
SACMAT
2005
ACM
15 years 10 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
DEXA
2006
Springer
160views Database» more  DEXA 2006»
15 years 8 months ago
Clustering of Search Engine Keywords Using Access Logs
Abstract. It the becomes possible that users can get kinds of information by just inputting search keyword(s) representing the topic which users are interested in. But it is not al...
Shingo Otsuka, Masaru Kitsuregawa
SWS
2006
ACM
15 years 10 months ago
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses
In this paper we propose a security architecture for Virtual Organizations for businesses. The Virtual Organizations we consider are based on web service technology to address int...
Rafael Deitos, Florian Kerschbaum, Philip Robinson
CCS
2009
ACM
16 years 5 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
FI
2011
146views more  FI 2011»
14 years 11 months ago
A Service Oriented Architecture for Personalized Universal Media Access
: Multimedia streaming means delivering continuous data to a plethora of client devices. Besides the actual data transport, this also needs a high degree of content adaptation resp...
Sascha Tönnies, Benjamin Köhncke, Patric...